It is very important to study computer network intrusion effect evaluation on studying security of computer network information system and harmfulness of computer network intrusion behavior. This is a concise overview paper about main research results and development foreground of computer network intrusion effect evaluation. In this paper we focus on the research results of the follow aspects: formal analysis of computer network intrusion behavior, taxonomy and analysis of security vulnerability and intrusion behavior, modeling and simulation of computer network intrusion behavior, evaluation model and method of computer network intrusion effect. In this paper we have given a full analysis of the main research work on computer network intrusion effect evaluation. At the end of this paper we summarize computer network intrusion effect evaluation and open up prospects for this area.
I. INTRODUCTIONThe computer network intrusions have become the most threaten to the security and operation of the Internet. It is very important to study the effect evaluation technologies of computer network intrusions. The main purpose of studying computer network intrusion effect evaluation is to put forward methods with which to evaluate the effect of computer network intrusions quantitatively or qualitatively. The evaluation technologies are also be used to check the effectiveness of computer network intrusions and security of computer network systems. The main contents of this paper include: (1) formal analysis of computer network intrusion behavior; (2) taxonomy and analysis of computer network security vulnerability and intrusion behavior; (3) modeling and simulation of computer network intrusion behavior; (4) evaluation model and method of computer network intrusion effect; (5) computer network security standard. The rest sections of this paper are organized along with the main contents outlined above. At the end of this paper we summarize computer network intrusion effect evaluation and open up prospects for this area.